Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images

Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrit...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Mathematical problems in engineering 2016-01, Vol.2016 (2016), p.1-13
Hauptverfasser: Shah, Mohsin, Ashraf, Rehan, Irtaza, Aun, Nawaz, Tabassam, Mahmood, Toqeer, Mahmood, Muhammad Tariq
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 13
container_issue 2016
container_start_page 1
container_title Mathematical problems in engineering
container_volume 2016
creator Shah, Mohsin
Ashraf, Rehan
Irtaza, Aun
Nawaz, Tabassam
Mahmood, Toqeer
Mahmood, Muhammad Tariq
description Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.
doi_str_mv 10.1155/2016/8713202
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1825520473</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>4086504691</sourcerecordid><originalsourceid>FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</originalsourceid><addsrcrecordid>eNqF0E1Lw0AQBuAgCtbqzbMEvAgau7Mf-TiW1qrQ4qWCt7DZTNotabbupkr-vVtSELx4moF5GGbeILgG8gggxIgSiEdpAowSehIMQMQsEsCTU98TyiOg7OM8uHBuQwgFAekgWEzMrosW5gvDmbErtF04xRZVq00TLlGtG_25x7Ay9jDHxmkVjhtZd067UDfhVK90K-vwdStX6C6Ds0rWDq-OdRi8z56Wk5do_vb8OhnPI8Uy1kaCxmmaVAWTJOFQqDLmcZUglAUITuNMEJnxFBknheQxqLISlMuqLLICCCrJhsFdv3dnjT_PtflWO4V1LRs0e5dDSoWghCfM09s_dGP21n_gVZIJD1ORevXQK2WNcxarfGf1VtouB5Ifss0P2ebHbD2_7_laN6X81v_pm16jN1jJXw1AEyHYD1P8gS0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1795825858</pqid></control><display><type>article</type><title>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</title><source>Wiley-Blackwell Open Access Titles</source><source>EZB-FREE-00999 freely available EZB journals</source><source>Alma/SFX Local Collection</source><creator>Shah, Mohsin ; Ashraf, Rehan ; Irtaza, Aun ; Nawaz, Tabassam ; Mahmood, Toqeer ; Mahmood, Muhammad Tariq</creator><contributor>Peng, Haipeng</contributor><creatorcontrib>Shah, Mohsin ; Ashraf, Rehan ; Irtaza, Aun ; Nawaz, Tabassam ; Mahmood, Toqeer ; Mahmood, Muhammad Tariq ; Peng, Haipeng</creatorcontrib><description>Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.</description><identifier>ISSN: 1024-123X</identifier><identifier>EISSN: 1563-5147</identifier><identifier>DOI: 10.1155/2016/8713202</identifier><language>eng</language><publisher>Cairo, Egypt: Hindawi Publishing Corporation</publisher><subject>Blurring ; Colleges &amp; universities ; Computer engineering ; Computer science ; Decomposition ; Digital imaging ; Digital signatures ; Editing ; Forensic engineering ; Forensic sciences ; Forgery ; Image compression ; Image detection ; Mathematical analysis ; Noise ; Principal components analysis ; Representations ; Reproduction ; State-of-the-art reviews ; Wavelet transforms</subject><ispartof>Mathematical problems in engineering, 2016-01, Vol.2016 (2016), p.1-13</ispartof><rights>Copyright © 2016 Toqeer Mahmood et al.</rights><rights>Copyright © 2016 Toqeer Mahmood et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</citedby><cites>FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><contributor>Peng, Haipeng</contributor><creatorcontrib>Shah, Mohsin</creatorcontrib><creatorcontrib>Ashraf, Rehan</creatorcontrib><creatorcontrib>Irtaza, Aun</creatorcontrib><creatorcontrib>Nawaz, Tabassam</creatorcontrib><creatorcontrib>Mahmood, Toqeer</creatorcontrib><creatorcontrib>Mahmood, Muhammad Tariq</creatorcontrib><title>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</title><title>Mathematical problems in engineering</title><description>Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.</description><subject>Blurring</subject><subject>Colleges &amp; universities</subject><subject>Computer engineering</subject><subject>Computer science</subject><subject>Decomposition</subject><subject>Digital imaging</subject><subject>Digital signatures</subject><subject>Editing</subject><subject>Forensic engineering</subject><subject>Forensic sciences</subject><subject>Forgery</subject><subject>Image compression</subject><subject>Image detection</subject><subject>Mathematical analysis</subject><subject>Noise</subject><subject>Principal components analysis</subject><subject>Representations</subject><subject>Reproduction</subject><subject>State-of-the-art reviews</subject><subject>Wavelet transforms</subject><issn>1024-123X</issn><issn>1563-5147</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNqF0E1Lw0AQBuAgCtbqzbMEvAgau7Mf-TiW1qrQ4qWCt7DZTNotabbupkr-vVtSELx4moF5GGbeILgG8gggxIgSiEdpAowSehIMQMQsEsCTU98TyiOg7OM8uHBuQwgFAekgWEzMrosW5gvDmbErtF04xRZVq00TLlGtG_25x7Ay9jDHxmkVjhtZd067UDfhVK90K-vwdStX6C6Ds0rWDq-OdRi8z56Wk5do_vb8OhnPI8Uy1kaCxmmaVAWTJOFQqDLmcZUglAUITuNMEJnxFBknheQxqLISlMuqLLICCCrJhsFdv3dnjT_PtflWO4V1LRs0e5dDSoWghCfM09s_dGP21n_gVZIJD1ORevXQK2WNcxarfGf1VtouB5Ifss0P2ebHbD2_7_laN6X81v_pm16jN1jJXw1AEyHYD1P8gS0</recordid><startdate>20160101</startdate><enddate>20160101</enddate><creator>Shah, Mohsin</creator><creator>Ashraf, Rehan</creator><creator>Irtaza, Aun</creator><creator>Nawaz, Tabassam</creator><creator>Mahmood, Toqeer</creator><creator>Mahmood, Muhammad Tariq</creator><general>Hindawi Publishing Corporation</general><general>Hindawi Limited</general><scope>ADJCN</scope><scope>AHFXO</scope><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>FR3</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>KR7</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20160101</creationdate><title>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</title><author>Shah, Mohsin ; Ashraf, Rehan ; Irtaza, Aun ; Nawaz, Tabassam ; Mahmood, Toqeer ; Mahmood, Muhammad Tariq</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c393t-526887fb3a0741bcd646f7e1db15426950a948e340ba461cdf524afdb9b10eca3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Blurring</topic><topic>Colleges &amp; universities</topic><topic>Computer engineering</topic><topic>Computer science</topic><topic>Decomposition</topic><topic>Digital imaging</topic><topic>Digital signatures</topic><topic>Editing</topic><topic>Forensic engineering</topic><topic>Forensic sciences</topic><topic>Forgery</topic><topic>Image compression</topic><topic>Image detection</topic><topic>Mathematical analysis</topic><topic>Noise</topic><topic>Principal components analysis</topic><topic>Representations</topic><topic>Reproduction</topic><topic>State-of-the-art reviews</topic><topic>Wavelet transforms</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shah, Mohsin</creatorcontrib><creatorcontrib>Ashraf, Rehan</creatorcontrib><creatorcontrib>Irtaza, Aun</creatorcontrib><creatorcontrib>Nawaz, Tabassam</creatorcontrib><creatorcontrib>Mahmood, Toqeer</creatorcontrib><creatorcontrib>Mahmood, Muhammad Tariq</creatorcontrib><collection>الدوريات العلمية والإحصائية - e-Marefa Academic and Statistical Periodicals</collection><collection>معرفة - المحتوى العربي الأكاديمي المتكامل - e-Marefa Academic Complete</collection><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access Journals</collection><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East &amp; Africa Database</collection><collection>ProQuest Central Korea</collection><collection>Engineering Research Database</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>Mathematical problems in engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shah, Mohsin</au><au>Ashraf, Rehan</au><au>Irtaza, Aun</au><au>Nawaz, Tabassam</au><au>Mahmood, Toqeer</au><au>Mahmood, Muhammad Tariq</au><au>Peng, Haipeng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images</atitle><jtitle>Mathematical problems in engineering</jtitle><date>2016-01-01</date><risdate>2016</risdate><volume>2016</volume><issue>2016</issue><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1024-123X</issn><eissn>1563-5147</eissn><abstract>Due to the powerful image editing tools images are open to several manipulations; therefore, their authenticity is becoming questionable especially when images have influential power, for example, in a court of law, news reports, and insurance claims. Image forensic techniques determine the integrity of images by applying various high-tech mechanisms developed in the literature. In this paper, the images are analyzed for a particular type of forgery where a region of an image is copied and pasted onto the same image to create a duplication or to conceal some existing objects. To detect the copy-move forgery attack, images are first divided into overlapping square blocks and DCT components are adopted as the block representations. Due to the high dimensional nature of the feature space, Gaussian RBF kernel PCA is applied to achieve the reduced dimensional feature vector representation that also improved the efficiency during the feature matching. Extensive experiments are performed to evaluate the proposed method in comparison to state of the art. The experimental results reveal that the proposed technique precisely determines the copy-move forgery even when the images are contaminated with blurring, noise, and compression and can effectively detect multiple copy-move forgeries. Hence, the proposed technique provides a computationally efficient and reliable way of copy-move forgery detection that increases the credibility of images in evidence centered applications.</abstract><cop>Cairo, Egypt</cop><pub>Hindawi Publishing Corporation</pub><doi>10.1155/2016/8713202</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1024-123X
ispartof Mathematical problems in engineering, 2016-01, Vol.2016 (2016), p.1-13
issn 1024-123X
1563-5147
language eng
recordid cdi_proquest_miscellaneous_1825520473
source Wiley-Blackwell Open Access Titles; EZB-FREE-00999 freely available EZB journals; Alma/SFX Local Collection
subjects Blurring
Colleges & universities
Computer engineering
Computer science
Decomposition
Digital imaging
Digital signatures
Editing
Forensic engineering
Forensic sciences
Forgery
Image compression
Image detection
Mathematical analysis
Noise
Principal components analysis
Representations
Reproduction
State-of-the-art reviews
Wavelet transforms
title Copy-Move Forgery Detection Technique for Forensic Analysis in Digital Images
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T02%3A20%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Copy-Move%20Forgery%20Detection%20Technique%20for%20Forensic%20Analysis%20in%20Digital%20Images&rft.jtitle=Mathematical%20problems%20in%20engineering&rft.au=Shah,%20Mohsin&rft.date=2016-01-01&rft.volume=2016&rft.issue=2016&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1024-123X&rft.eissn=1563-5147&rft_id=info:doi/10.1155/2016/8713202&rft_dat=%3Cproquest_cross%3E4086504691%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1795825858&rft_id=info:pmid/&rfr_iscdi=true